<b>Overview</b><br><div><p><span xml:lang="EN-US" data-contrast="auto">We’re looking for experienced and driven senior security professionals to join our STORM security research group and help shape the security posture of Microsoft Specialized Cloud systems from the ground up. As part of our mission to embed security into all the development phases, you’ll lead design reviews, threat modeling, and security assessments across a wide range of technologies - from OS internals and virtualization to cloud platforms, containerized environments, and application security.</span><span data-ccp-props="{}"> </span></p></div><div><p><span xml:lang="EN-US" data-contrast="auto">This is a high-impact role for security professionals who thrive on technical depth, cross-team collaboration, and influencing secure design at scale.</span></p></div><br><br><b>Responsibilities</b><br><div><p> </p></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="1" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="1" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Lead security design and architecture reviews as well as threat modeling engagements for complex systems.</span><span data-ccp-props="{}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="2" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="1" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Identify architectural vulnerabilities and guide engineering teams towards secure design patterns. </span><span data-ccp-props="{}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="3" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="1" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Collaborate with security teams to identify vulnerabilities and embed security early in the product lifecycle. </span><span data-ccp-props="{}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="4" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="1" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Communicate findings clearly to both technical and non-technical stakeholders. </span><span data-ccp-props="{}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="5" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="1" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Drive security hardenings and security-driven redesign to improve security posture.</span><span data-ccp-props="{}"> </span></p></li></ul></div><div><ul style="list-style-type: disc;" role="list"><li role="listitem" data-aria-level="1" data-aria-posinset="6" data-list-defn-props="{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}" data-listid="1" data-font="Symbol" data-leveltext="" aria-setsize="-1"><p><span xml:lang="EN-US" data-contrast="auto">Mentor engineers and promote a culture of security-first thinking. </span><span data-ccp-props="{}"> </span></p></li></ul></div><br><br><b>Qualifications</b><br><div><div><p> </p></div><div><ul style="list-style-type: disc;"><li>Expertise in structured threat modeling and architectural risk analysis. </li><li><p>Deep knowledge in one or more of the following: </p></li></ul></div><div><ul><li style="list-style-type: none;"><ul style="list-style-type: circle;"><li><p>Operating System internals (Windows/Linux), memory management, and secure boot. </p></li></ul></li></ul></div><div><ul><li style="list-style-type: none;"><ul style="list-style-type: circle;"><li><p>Virtualization, Cloud Architecture, and Container security. </p></li></ul></li></ul></div><div><ul><li style="list-style-type: none;"><ul style="list-style-type: circle;"><li><p>Application Security principles and secure software development practices across microservices, APIs, and distributed systems. </p></li></ul></li></ul></div><div><ul><li style="list-style-type: none;"><ul style="list-style-type: circle;"><li><p>Cloud-native services and their security implications (e.g., identity, secrets management, service mesh, serverless). </p></li></ul></li></ul></div><div><p> </p></div><div><p>Other Requirements </p><p> </p></div><div><ul style="list-style-type: disc;"><li>6+ years in security engineering, architecture, or related roles. </li><li><p>Strong sense of Responsibility and Leadership skills. </p></li></ul></div></div><div><div><ul style="list-style-type: disc;"><li><p>Excellent communication skills - able to articulate complex security issues clearly and persuasively. </p></li></ul></div><div><ul style="list-style-type: disc;"><li><p>Proven ability to lead cross-functional engagements and influence product teams. </p></li></ul></div><div><ul style="list-style-type: disc;"><li><p>Analytical mindset with a “learn-it-all” attitude and strong problem-solving skills. </p></li></ul></div><div><ul style="list-style-type: disc;"><li><p>Comfortable navigating ambiguity and organizational complexity. </p></li></ul><p> </p></div><div><p>Experience & Impact <br><br></p></div><div><ul style="list-style-type: disc;"><li><p>Demonstrated success in leading security reviews or threat modeling for large-scale systems. </p></li></ul></div><div><ul style="list-style-type: disc;"><li><p>Prior experience in driving and managing internal security initiatives and integrating Secure Development Lifecycle (SDLC) concepts. </p></li></ul></div><div><ul style="list-style-type: disc;"><li><p>Track record of identifying and mitigating vulnerabilities in OS, cloud, or infrastructure components. </p></li></ul></div><div><ul style="list-style-type: disc;"><li><p>Proficiency in secure coding and code reviews. </p></li></ul></div><div><ul style="list-style-type: disc;"><li><p>Familiarity with fuzzing and exploitation techniques. </p></li></ul></div></div> <br><p>This position will be open for a minimum of 5 days, with applications accepted on an ongoing basis until the position is filled.</p><br><hr><br><p>Microsoft is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance with religious accommodations and/or a reasonable accommodation due to a disability during the application process, read more about <a href="https://careers.microsoft.com/v2/global/en/accessibility.html"><b><u>requesting accommodations.</u></b></a></p>